CVE-2021-3156
critical-risk
Published 2021-01-26
Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based buffer overflow, which allows privilege escalation to root via "sudoedit -s" and a command-line argument that ends with a single backslash character.
Do I need to act?
!
92.3% chance of exploitation in next 30 days
EPSS score — higher than 8% of all CVEs
!
CISA KEV: actively exploited in the wild
On the Known Exploited Vulnerabilities catalog — federal agencies must patch
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.8/10
High
LOCAL
/ LOW complexity
Affected Products (20)
Skynas Firmware
Affected Vendors
References (68)
Mailing List
http://seclists.org/fulldisclosure/2021/Feb/42
Third Party Advisory
https://security.gentoo.org/glsa/202101-33
and 48 more references
73
/ 100
critical-risk
Severity
24/34 · High
Exploitability
27/34 · High
Exposure
22/34 · High